Technology is Not a Substitute for Good Business Processes | Microbyte

Technology is Not a Substitute for Good Business Processes

robot touches human hand

With all the readily available news, it’s important that we never advocate spreading undue concerns or raising anxiety with no justification. But, given the unprecedented rise in hacking and phishing attempts globally in 2018, we feel compelled to draw as much attention as possible to good business practices.

Many of you will have received emails prompting you to click links, sign in here and send money, etc., and you are no doubt always vigilant. However, people will continue to get “caught out” and these risks will increase over the coming months/years.

As an IT company, from a technology perspective we are continuously improving our offerings, and doing what we can to keep our networks secure. Multi-factor Authentication and Identity Protection Services are just two examples which are available and we are of course actively encouraging uptake of these.

As important as the technology, however, are the processes which govern their use (or should). It’s vitally important we all work regularly on our own internal processes to control the flow of data within our businesses.

How can I spot these bad practices?

Some very specific examples where we have seen (what we would perceive as) a lack of validation and controls might be:

  • In-depth phone conversations (and email) with individuals imitating genuine employees, suppliers or customers
  • Large payments made to bank accounts without enough verification as to the destination
  • Attempts to change to details held on record pertaining to individuals working for a company
  • Very few checks in place prior to agreeing to change bank account details and sending funds elsewhere
  • No multiple signoffs for large BACS payments, either verbal or written

These are just some examples where we need to evaluate, with surgical precision, who is allowed to do what within our businesses, where our liabilities lie, and how we double and triple check absolutely anything which potentially has a big risk attached.

As an example of progress, banks are stepping up efforts to provide more secure platforms and verification which is evident all around us. However there will never be enough, and the battle against fraudsters will be eternal. The fact you can still send funds to anywhere, with nothing more than a few numbers, and not even a company name that matches speaks volumes.

The time will come when we will be unable to blame the systems for not protecting us, and more good old-fashioned checklists might just have to make a comeback.

 

 

 

 

 

 

Similar blogs

Benefits of Copilot for Microsoft 365

Benefits of Copilot for Microsoft 365

Copilot is an Artificial intelligence (AI)-based tool to enhance creativity and time efficiency. Benefits of using this ChatGPT AI technology – Microsoft is an investor in the business – do not stop there. Depending on the version used, the interface generates useful responses based on meaningful inputs. Microsoft announced Copilot for Microsoft 365 and first…

Read More

Avatar photo

Microsoft Authenticator vs Google Authenticator

Microsoft Authenticator vs Google Authenticator

Our digital lives in 2024 are increasingly complex. Effective security is essential to ensure nothing nefarious occurs. Manual password entry creates the risk of ‘shoulder surfing’ or other surreptitious methods used to discover your security information. Using two-factor authentication (2FA) or multi-factor authentication tools (MFA), such as Google Authenticator or Microsoft Authenticator mobile apps, substantially…

Read More

Avatar photo

Moving from Internal to Outsourced IT Support

Moving from Internal to Outsourced IT Support

Having reliable IT support is one of the most crucial parts of any modern business. Whether it’s tackling minor software glitches, protecting against cyber threats, offering a seamless experience to customers, or simply ensuring a smooth workflow for employees, an effective IT support system is the backbone of any business. But the game is changing….

Read More

Avatar photo

The Business Benefits of Cyber Essentials Certification

The Business Benefits of Cyber Essentials Certification

As IT continues to dominate and dictate international business, fortifying digital defences is paramount. Protecting your business from the devastating consequences of a cyber security breach should be a number one priority for every business.  The good news is that obtaining a Cyber Essentials certification is a simple and easy step to help protect against…

Read More

Avatar photo

Improve Your IT Helpdesk With SOPs

Improve Your IT Helpdesk With SOPs

As technology continues to drive businesses around the world, the role of IT helpdesks has evolved into a pivotal force, serving as the central point for user support and technical issue resolution. With organisations increasingly reliant on intricate digital infrastructures, the efficiency of IT helpdesks becomes paramount in ensuring seamless operations. Enter Standard Operating Procedures…

Read More

Avatar photo

A guide to switching IT Support Provider

A guide to switching IT Support Provider

The relationship between a business and its IT support company is a close one. With IT at the centre of almost every business, responsible for daily operations, goals, plans, feedback, data storage and communication, the right IT partner can be the driving force behind a company’s success. But as your business evolves, it’s essential to…

Read More

Avatar photo